#RisePro

Top 10 last week's threats by uploads 🌐
⬆️ #Zombie 772 (210)
⬆️ #Lumma 540 (462)
⬆️ #Agenttesla 494 (340)
⬆️ #Xworm 349 (277)
⬆️ #Snake 266 (210)
⬇️ #Asyncrat 250 (296)
⬇️ #Remcos 183 (193)
⬆️ #Dcrat 177 (133)
⬇️ #Berbew 144 (153)
⬆️ #Risepro 144 (98)

👉 Track them all: any.run/malware-trends/?utm_so

#cybersecurity #infosec

2025-06-11

Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia
#LummaStealer #RisePro #MetaStealer
group-ib.com/media-center/pres

Have you seen The Empire in your network?

A #cybercrime group, registered under “EVILEMPIRE”, is hosting dozens of #C2 servers between 185.172.128.0-185.172.128.255 including:
#RedLineStealer #LokiBot #HookBot #RisePro #Amadey #CobaltStrike #AsyncRAT #AMOS

Don’t let your computers enlist! Block 185.172.128.0/24 🔥

Captain CyberbeardCaptCyberBeard
2023-11-29

🏴‍☠️ Uncover the secrets of RisePro, the stealthy RAT of the cyber seas! Navigate our latest post for insights on this digital menace.

cybercorsair.blogspot.com/2023

2023-02-13

A fresh #risepro sample:

app.any.run/tasks/236e360f-e88

c2
https://d-rise[.]cc/MWTSL/get_marks.php

cc @da_667 on traffic

WinFuture.deWinFuture
2022-12-25

Cyberkriminelle machen sich mit einem alten Trick auf die Suche nach Opfern: Sie ködern mit gecrackten Programmen und stellen dann stattdessen eine mit dem Namen zum Download bereit. winfuture.de/news,133710.html?

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst